Archive / technology

Top Ten Reviews provides a technical and in-depth review of the IronKey Personal D200, a must-read for the techies among you. Key points: The encryption is hardware-based 256-bit AES validated by the National Institute of Standards and Technology to meet the Level 3 criteria of FIPS 140-2. AES is the Advanced Encryption Standard adopted by […]

In another warning story, this time from the USA, internet marketing firm Epsilon was the target of a specific attack, allowing customers’ confidential data to be exposed. The theft of the confidential information (in this case, email addresses) can enable hackers to use phishing to trick the customer into revealing further confidential information. In this […]

PC World reports that the enterprise, rather than the consumer, will be the predicted cybercrime target for 2010. “As the new decade opens, cybercrime is diverging down a different path as cyber attacks move beyond the financial services industry and malware makes a shift from targeting consumer desktops to employees in the enterprise,” states the […]

Secure Active UK provides a picture tutorial on the IronKey Enterprise, an option for companies or businesses with two or more IronKeys, which enable the administrator to fully control the devices including the ability to remotely disable and wipe the devices if necessary. Device logs are also available so that companies can be in control […]